Series encryption in a quantum cryptographic system
A system obtains first encryption key material using quantum cryptographic mechanisms and obtains second encryption key material using non-quantum cryptographic mechanisms. The system encrypts data using the first encryption key material to produce first encrypted data and encrypts the first encrypted data using the second encryption key material to produce second encrypted data.
The U.S. Government has a paid-up license in this invention and the right in limited circumstances to require the patent owner to license others on reasonable terms as provided for by the terms of Contract No. F30602-01-C-0170, awarded by the Defense Advanced Research Project Agency (DARPA).
FIELD OF THE INVENTIONThe present invention relates generally to cryptographic systems and, more particularly, to cryptographic systems employing quantum cryptography.
BACKGROUND OF THE INVENTION Within the field of cryptography, it is well recognized that the strength of any cryptographic system depends on, among other things, the key distribution technique employed. For conventional encryption to be effective, such as a symmetric key system, two communicating parties must share the same key and that key must be protected from access by others. The key must, therefore, be distributed to each of the parties.
To combat these inherent deficiencies in the key distribution process, researchers have developed a key distribution technique called quantum cryptography. Quantum cryptography employs quantum systems and applicable fundamental principles of physics to ensure the security of distributed keys. Heisenberg's uncertainty principle mandates that any attempt to observe the state of a quantum system will necessarily induce a change in the state of the quantum system. Thus, when very low levels of matter or energy, such as individual photons, are used to distribute keys, the techniques of quantum cryptography permit the key distributor and receiver to determine whether any eavesdropping has occurred during the key distribution. Quantum cryptography, therefore, prevents an eavesdropper, like Eve, from copying or intercepting a key that has been distributed from Alice to Bob without a significant probability of Bob's or Alice's discovery of the eavesdropping.
A well known quantum key distribution scheme involves a quantum channel, through which Alice and Bob send keys using polarized or phase encoded photons, and a public channel, through which Alice and Bob send ordinary messages. Since these polarized or phase encoded photons are employed for quantum key distribution (QKD), they are often termed QKD photons. The quantum channel is a transmission medium that isolates the QKD photons from interaction with the environment. The public channel may include a channel on any type of communication network such as a Public Switched Telephone Network, the Internet, or a wireless network. An eavesdropper, Eve, may attempt to measure the photons on the quantum channel. Such eavesdropping, however, will induce a measurable disturbance in the photons in accordance with the Heisenberg uncertainty principle. Alice and Bob use the public channel to discuss and compare the photons sent through the quantum channel. If, through their discussion and comparison, they determine that there is no evidence of eavesdropping, then the key material distributed via the quantum channel can be considered completely secret.
Alice and Bob then estimate 230 whether Eve has eavesdropped upon the key distribution. To do this, Alice and Bob must agree upon a maximum tolerable error rate. Errors can occur due to the intrinsic noise of the quantum channel and eavesdropping attack by a third party. Alice and Bob choose randomly a subset of photons m from the sequence of photons that have been transmitted and measured on the same basis. For each of the m photons, Bob announces publicly his measurement result. Alice informs Bob whether his result is the same as what she had originally sent. They both then compute the error rate of the m photons and, since the measurement results of the m photons have been discussed publicly, the polarization data of the m photons are discarded. If the computed error rate is higher than the agreed upon tolerable error rate (typically no more than about 15%), Alice and Bob infer that substantial eavesdropping has occurred. They then discard the current polarization data and start over with a new sequence of photons. If the error rate is acceptably small, A lice and Bob adopt the remaining polarizations, or some algebraic combination of their values, as secret bits of a shared secret key 235, interpreting horizontal or 45 degree polarized photons as binary 0's and vertical or 135 degree photons as binary 1's (see row 6 of
Alice and Bob may also implement an additional privacy amplification process 240 that reduces the key to a small set of derived bits to reduce Eve's knowledge of the key. If, subsequent to discussion 215 and sifting 225, Alice and Bob adopt n bits as secret bits, the n bits can be compressed using, for example, a hash function. Alice and Bob agree upon a publicly chosen hash function ƒ and take K=ƒ(n bits) as the shared r-bit length key K. The hash function randomly redistributes the n bits such that a small change in bits produces a large change in the hash value. Thus, even if Eve determines a number of bits of the transmitted key through eavesdropping, and also knows the hash function ƒ, she still will be left with very little knowledge regarding the content of the hashed r-bit key K. Alice and Bob may further authenticate the public channel transmissions to prevent a “man-in-the-middle” attack in which Eve masquerades as either Bob or Alice.
SUMMARY OF THE INVENTIONIn accordance with the purpose of the invention as embodied and broadly described herein, a method may include obtaining first encryption key material using quantum cryptographic mechanisms and obtaining second encryption key material using non-quantum cryptographic mechanisms. The method may further include encrypting data using the first encryption key material to produce first encrypted data and encrypting the first encrypted data using the second encryption key material to produce second encrypted data.
Consistent with a further aspect of the invention, a system may include a device configured to obtain first encryption key material using quantum cryptographic mechanisms. The system may further include a first encryptor configured to encrypt data using the first encryption key material to produce first encrypted data and a second encryptor configured to obtain second encryption key material using non-quantum cryptographic mechanisms and encrypt the first encrypted data using the second encryption key material to produce second encrypted data.
Consistent with another aspect of invention, a system may include a first encryptor configured to obtain first encryption key material using non-quantum cryptographic mechanisms and encrypt data using the first encryption key material to produce first encrypted data. The system may further include a device configured to obtain second encryption key material using quantum cryptographic mechanisms and a second encryptor configured to encrypt the first encrypted data using the second encryption key material to produce second encrypted data.
Consistent with yet another aspect of the invention, a method may include communicating a sequence of encryption key symbols between endpoints via a quantum channel using quantum cryptographic mechanisms and obtaining first encryption key material using non-quantum cryptographic mechanisms. The method may further include discussing the sequence of encryption key symbols via a non-quantum channel to obtain second encryption key material that comprises a subset of the sequence of encryption key symbols. The discussion is encrypted using the first encryption key material.
Consistent with an additional aspect of the invention, a method may include discussing, over a network, a sequence of symbols obtained using quantum cryptographic mechanisms to derive first encryption key material. The method may further include communicating traffic over the network based on the first encryption key material. The communicated traffic is cryptographically isolated from the discussion.
Consistent with a further aspect of the invention, a system may include a first encryptor configured to obtain first encryption key material using quantum cryptographic techniques. The system may further include a second encryptor configured to obtain second encryption key material using non-quantum cryptographic techniques. The data is encrypted using the first encryptor and second encryptor connected in series.
Consistent with yet another aspect of the invention, a system may include an encryptor and a device configured to derive encryption key material using quantum cryptographic techniques, and implement a key fill interface for injecting the encryption key material into the encryptor. The key fill interface includes one of a DS-101 or DS-102 key fill interface.
BRIEF DESCRIPTION OF THE DRAWINGSThe accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate one or more exemplary embodiments of the invention and, together with the description, explain the invention. In the drawings,
The following detailed description of the invention refers to the accompanying drawings. The same reference numbers in different drawings identify the same or similar elements. Also, the following detailed description does not limit the invention. Instead, the scope of the invention is defined by the appended claims.
As may be understood, there can be a natural reluctance on the part of communities who desire communications to embrace a novel form of cryptography, such as quantum cryptography, because there may be unforeseen flaws in the security of such novel techniques. In particular, users may be reluctant to adopt a quantum cryptographic system until there is a long, demonstrated track record of use without security issues. This leads to a “chicken and egg” problem in the adoption of quantum cryptography, in which the technology will not be employed until it has already demonstrated a long history of successful employment.
What is needed, therefore, is a way in which a quantum cryptographic system can be employed with assurances that the resultant security will be no worse than well-understood classical cryptographic systems. This invention provides such assurance, giving a resultant cryptographic system in which the security properties are at least as good as classical cryptographic systems, and which also offers the novel and heightened security associated with quantum cryptography.
Systems and methods consistent with principles of the invention, thus, provide this heightened security using quantum cryptography by implementing dual encryptors in series, where one of the encryptors uses encryption keys derived using quantum cryptography and a second of the encryptors uses encryption keys derived using “classical” key generation techniques (e.g., Diffie-Helman, shared secret keys distributed by a secure container, from a centralized facility, etc.). Traffic transmitted between a source and destination may, therefore, pass through two layers of encryption in series before it reaches a relatively unprotected transport network. Use of dual encryptors in series, consistent with principles of the invention, where one of the encryptors uses quantum cryptography, enables a high level of confidence that resultant transmitted traffic will really be cryptographically protected. These dual encryptors may be used in either order, e.g., performing classical encryption either before or after performing encryption with keys derived from quantum cryptography.
Exemplary Network
Private enclaves 410a and 410b may each include a local area network (LAN) interconnected with one or more hosts.
Network 425 may include one or more networks of any type, including a Public Land Mobile Network (PLMN), Public Switched Telephone Network (PSTN), LAN, metropolitan area network (MAN), wide area network (WAN), Internet, or Intranet. Network 425 may also include a dedicated fiber link or a dedicated freespace optical or radio link. The one or more PLMNs may further include packet-switched sub-networks, such as, for example, General Packet Radio Service (GPRS), Cellular Digital Packet Data (CDPD), and Mobile IP sub-networks.
Optical link/network 430 may include a link that may carry light throughout the electromagnetic spectrum, including light in the human visible spectrum and light beyond the human-visible spectrum, such as, for example, infrared or ultraviolet light. The link may include, for example, a conventional optical fiber. Alternatively, the link may include a free-space optical path, such as, for example, a path through the atmosphere or outer space, or even through water or other transparent media. As another alternative, the link may include a hollow optical fiber that may be lined with photonic band-gap material.
Furthermore, optical link/network 430 may include a QKD network that includes one or more QKD switches (not shown) for distributing encryption keys between a source QKD endpoint (e.g., QKD endpoint 405a) and a destination QKD endpoint (e.g., QKD endpoint 405b). Such a QKD network may include the QKD network described in U.S. patent application Ser. No. 09/943,709 (Attorney Docket No. 01-4015), entitled “Systems and Methods for Path Set-up in a Quantum Key Distribution Network,” and U.S. patent application Ser. No. 09/944,328 (Attorney Docket No. 00-4069), entitled “Quantum Cryptographic Key Distribution Networks with Untrusted Switches,” the entire disclosures of which are expressly incorporated by reference herein.
QKD endpoints 405a and 405b may distribute quantum cryptographic keys via a “quantum channel” of optical link/network 430. QKD endpoints 405a and 405b may distribute quantum cryptographic keys using any type of quantum cryptographic system including, for example, systems employing single-photon, or attenuated, optical pulses, “plug and play” systems, systems based on entanglement, or systems employing any form of quantum cryptography. Subsequent to quantum key distribution via the quantum channel of optical link/network 430, QKD endpoint 405a and QKD endpoint 405b may discuss distributed key material using a “discussion channel” of network 425 to agree on encryption key material 440 that may be provided to, and subsequently used by, quantum encryptors/decryptors 415a and 415b, for encrypting/decrypting traffic transported between private enclaves 410a and 410b via network 425. The “discussion” of the distributed key material may include existing techniques for deriving encryption key material from key symbols distributed via quantum cryptographic mechanisms, such as, for example, the techniques described above with respect to
In the exemplary implementation shown in
After obtaining cryptographic key material using “classical” techniques, non-quantum encryptors/decryptors 420a and 420b may then encrypt/decrypt traffic, already encrypted/decrypted by quantum encryptors/decryptors 415a and 415b, for transport between private enclaves 410a and 410b. Non-quantum encryptors/decryptors 420a and 420b, thus, provide an additional level of encryption that does not use the QKD techniques employed by QKD endpoints 405a and 405b and quantum encryptors/decryptors 415a and 415b. Quantum encryptors/decryptors 415a and 415b and non-quantum encryptors/decryptors 420a and 420b may be implemented as stand alone devices (i.e., in separate devices from one another), as combined devices (i.e., combined in a single device), or as part of a respective QKD endpoint 405 (e.g., quantum encryptor/decryptor 415a and non-quantum encryptor/decryptor 420a implemented in QKD endpoint 405a).
It will be appreciated that the number of components illustrated in
Input device 515 permits entry of data into QKD endpoint 405 and may include a user interface (not shown). Output device 520 permits the output of data in video, audio, and/or hard copy format. Quantum cryptographic transceiver 525 may include mechanisms for transmitting and receiving encryption keys using quantum cryptographic techniques via a quantum channel of optical link/network 430. In some implementations, quantum cryptographic transceiver 525 may include the transceiver components described in U.S. application Ser. No. 10/985,631; entitled “Systems and Methods for Framing Quantum Cryptographic Links” and filed on Nov. 10, 2004, the disclosure of which is incorporated by reference herein in its entirety. Network interface(s) 530 may interconnect QKD endpoint 405 with network 425. Optional key fill interface 535 may include existing mechanisms for injecting cryptographic key material into a respective quantum encryptor/decryptor 415. In exemplary implementations, key fill interface 535 may include known interfaces such as DS-101 or DS-102 interfaces. Bus 540 interconnects the various components of QKD endpoint 405 to permit the components to communicate with one another.
Exemplary Quantum Cryptographic Transceiver
QKD receiver 610 may include a photon detector 625 and a photon evaluator 630. Photon detector 625 can include, for example, one or more avalanche photo detectors (APDs) and/or photo-multiplier tubes (PMTs). Photon detector 625 may also include cryogenically cooled detectors that sense energy via changes in detector temperature or electrical resistivity as photons strike the detector apparatus. Photon detector 625 can detect photons received across optical link/network 430. Photon evaluator 630 may include circuitry for processing and evaluating output signals from photon detector 625 in accordance with quantum cryptographic techniques.
Exemplary Series Encryption Process
The exemplary process may begin by obtaining a sequence of quantum cryptographic key symbols (block 705). A QKD endpoint (e.g., QKD endpoint 405a) involved in QKD may obtain the quantum cryptographic key symbols using any existing technique for deriving encryption keys that can be used in any existing type of encryption/decryption technique. The obtained sequence of quantum cryptographic key symbols may then be distributed, via the quantum channel, from a source QKD endpoint to a destination QKD endpoint (block 710). For example, QKD endpoint 405a may distribute the cryptographic key symbols to QKD endpoint 405b via a quantum channel of optical link/network 430.
The source QKD endpoint and destination QKD endpoint may discuss, via a discussion channel, the distributed sequence of quantum cryptographic key symbols to obtain QKD key material (block 715). For example, QKD endpoint 405a may discuss, via a discussion channel of network 425, the sequence of quantum cryptographic key symbols distributed via the quantum channel with QKD endpoint 405b to obtain the QKD key material. In some implementations, the discussion may include employing “sifting” techniques to derive a subset of the sequence of quantum cryptographic key symbols distributed via the quantum channel to obtain the QKD key material. As shown in the exemplary network implementation of
Non-quantum cryptographic key material may be obtained by non-quantum encryptors/decryptors 420a and 420b. The non-quantum cryptographic key material may be obtained by non-quantum encryptors/decryptors 420a and 420b using “classical” techniques, such as, for example, manual fill of cryptographic key material from secure containers, generation of session keys by Diffie-Helman or other algorithmic techniques, public key techniques, provisioning of keys from a central repository, etc. Other types of “classical” techniques for obtaining encryption key material may be used consistent with principles of the invention.
In the exemplary network implementation shown in
In the exemplary network implementation shown in
The foregoing description of exemplary embodiments of the present invention provides illustration and description, but is not intended to be exhaustive or to limit the invention to the precise form disclosed. Modifications and variations are possible in light of the above teachings or may be acquired from practice of the invention. For example, while certain components of the invention have been described as implemented in software and others in hardware, other configurations may be possible.
While a series of acts has been described with regard to
Claims
1. A method, comprising:
- obtaining first encryption key material using quantum cryptographic mechanisms;
- obtaining second encryption key material using non-quantum cryptographic mechanisms;
- encrypting data using the first encryption key material to produce first encrypted data; and
- encrypting the first encrypted data using the second encryption key material to produce second encrypted data.
2. The method of claim 1, wherein obtaining the second encryption key material using non-quantum cryptographic mechanisms comprises at least one of:
- generating the second encryption key material using algorithmic techniques, obtaining the second encryption key material using public key techniques, obtaining the second encryption key material via provisioning of key material from a central repository, or manual fill of the second encryption key material from secure containers.
3. The method of claim 1, wherein obtaining the first encryption key material using quantum cryptographic mechanisms comprises:
- communicating a sequence of encryption key symbols between quantum cryptographic endpoints using quantum cryptographic techniques; and
- conducting a discussion of the sequence of encryption key symbols between the quantum cryptographic endpoints to obtain a subset of the sequence of encryption key symbols as the first encryption key material.
4. A system, comprising:
- a device configured to obtain first encryption key material using quantum cryptographic mechanisms;
- a first encryptor configured to encrypt data using the first encryption key material to produce first encrypted data;
- a second encryptor configured to: obtain second encryption key material using non-quantum cryptographic mechanisms, and encrypt the first encrypted data using the second encryption key material to produce second encrypted data.
5. A system, comprising:
- a first encryptor configured to: obtain first encryption key material using non-quantum cryptographic mechanisms, and encrypt data using the first encryption key material to produce first encrypted data; and
- a device configured to obtain second encryption key material using quantum cryptographic mechanisms; and
- a second encryptor configured to encrypt the first encrypted data using the second encryption key material to produce second encrypted data.
6. A method, comprising:
- obtaining first encryption key material using non-quantum cryptographic mechanisms;
- obtaining second encryption key material using quantum cryptographic mechanisms;
- encrypting data using the first encryption key material to produce first encrypted data; and
- encrypting the first encrypted data using the second encryption key material to produce second encrypted data.
7. A method, comprising:
- communicating a sequence of encryption key symbols between endpoints via a quantum channel using quantum cryptographic mechanisms;
- obtaining first encryption key material using non-quantum cryptographic mechanisms; and
- discussing the sequence of encryption key symbols via a non-quantum channel to obtain second encryption key material that comprises a subset of the sequence of encryption key symbols, wherein the discussion is encrypted using the first encryption key material.
8. The method of claim 7, further comprising:
- using the second encryption key material for encrypting data traffic sent between a source and destination.
9. The method of claim 7, wherein obtaining the first encryption key material using non-quantum cryptographic mechanisms comprises at least one of:
- generating the first encryption key material using algorithmic techniques, obtaining the first encryption key material using public key techniques, obtaining the first encryption key material via provisioning of key material from a central repository, or obtaining the first encryption key material via manual fill of the second encryption key material from secure containers.
10. A system, comprising:
- an encryptor configured to obtain first encryption key material using non-quantum cryptographic mechanisms;
- a first quantum cryptographic key distributor configured to: communicate a sequence of encryption key symbols to or from a second quantum cryptographic key distributor using quantum cryptographic mechanisms via a quantum channel, and discuss the sequence of encryption key symbols with the second quantum cryptographic key distributor via a non-quantum channel to obtain second encryption key material that comprises a subset of the sequence of encryption key symbols,
- wherein the encryptor is further configured to encrypt the discussion using the first encryption key material.
11. A method, comprising:
- discussing, over a network, a sequence of symbols obtained using quantum cryptographic mechanisms to derive first encryption key material; and
- communicating traffic over the network based on the first encryption key material, wherein the communicated traffic is cryptographically isolated from the discussion.
12. The method of claim 11, wherein cryptographically isolating the traffic from the discussion comprises:
- using different encryption key material than the first encryption key material to encrypt the discussion.
13. The method of claim 11, wherein cryptographically isolating the traffic from the discussion comprises:
- using a different encryption technique to encrypt the discussion and the communicated traffic.
14. A system, comprising:
- a first encryptor configured to obtain first encryption key material using quantum cryptographic techniques; and
- a second encryptor configured to obtain second encryption key material using non-quantum cryptographic techniques,
- wherein data is encrypted using the first encryptor and second encryptor connected in series.
15. The system of claim 14, wherein the first encryptor encrypts the traffic prior to encryption by the second encryptor.
16. The system of claim 14, wherein the second encryptor encrypts traffic prior to encryption by the first encryptor.
17. The system of claim 14, wherein the data comprises communication traffic transmitted between a source and destination.
18. A system, comprising:
- an encryptor;
- a device configured to: derive encryption key material using quantum cryptographic techniques, and implement a key fill interface for injecting the encryption key material into the encryptor, wherein the key fill interface includes one of a DS-101 or DS-102 key fill interface.
19. A system, comprising:
- means for obtaining first encryption key material using quantum cryptographic mechanisms;
- means for obtaining second encryption key material using non-quantum cryptographic mechanisms;
- means for encrypting data using the first encryption key material to produce first encrypted data; and
- means for encrypting the first encrypted data using the second encryption key material to produce second encrypted data.
Type: Application
Filed: Dec 6, 2005
Publication Date: Jun 7, 2007
Inventor: Brig Elliott (Arlington, MA)
Application Number: 11/294,413
International Classification: H04L 9/00 (20060101);